CVE-2013-10070

CRITICAL

PHP-Charts v1.0 - RCE

Title source: llm

Description

PHP-Charts v1.0 contains a PHP code execution vulnerability in wizard/url.php, where user-supplied GET parameter names are passed directly to eval() without sanitization. A remote attacker can exploit this flaw by crafting a request that injects arbitrary PHP code, resulting in command execution under the web server's context. The vulnerability allows unauthenticated attackers to execute system-level commands via base64-encoded payloads embedded in parameter names, leading to full compromise of the host system.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/24273
exploitdb WORKING POC VERIFIED
by AkaStep · textwebappsphp
https://www.exploit-db.com/exploits/24201
metasploit WORKING POC EXCELLENT
by AkaStep, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/php_charts_exec.rb

Scores

CVSS v4 10.0
EPSS 0.6252
EPSS Percentile 98.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Details

CWE
CWE-95
Status published
Products (1)
PHP-Charts/PHP-Charts 1.0
Published Aug 05, 2025
Tracked Since Feb 18, 2026